A Geological Borehole Data Protection Based on Graph Neural Networks

被引:0
|
作者
Shang H. [1 ]
Zhu H. [1 ,2 ]
Li S. [1 ]
Song X. [3 ]
Xia Y. [4 ]
Liu H. [4 ]
Yang F. [4 ]
机构
[1] Shandong Institute of Geological Survey, Jinan
[2] School of Environmental Studies, China University of Geosciences, Wuhan
[3] Shandong Provicial Archives of Natural Resources, Jinan
[4] School of Computer Science, China University of Geosciences, Wuhan
关键词
data protection for geological drilling data; deep learning; figure adversarial attack; graph attention network; graph neural network; interpretability;
D O I
10.3799/dqkx.2021.232
中图分类号
学科分类号
摘要
With the development of deep learning technology, attackers can obtain potentially sensitive information from public geological data through classification, prediction, and other methods, which could lead to the leakage of important geological data. To solve the above problems, we propose a geological drilling data protection model based on graph adversarial attack Gcntack. Based on the degree properties of geological data topology, we first generate attacks that satisfy the same power-law distribution as tiny node disturbance. It can ensure that the adversarial attacks are not easy to be found, and while can change the classification result of the target node. Secondly, we introduce an attention mechanism. Using a graph attention network model based on interpretability, we analyze the properties of key nodes that directly affect the results of the adversarial attacks, so as to verify the rationality of the selecting adversarial nodes in the Gcntack model. Finally, a comprehensive evaluation, based on the benchmark dataset and geological drilling dataset, is presented to show this proposed scheme can reduce the prediction accuracy of attackers and achieve the purpose of protecting important geological drilling data. © 2023 China University of Geosciences. All rights reserved.
引用
收藏
页码:3151 / 3161
页数:10
相关论文
共 31 条
  • [1] Ali-Ozkan O., Ouda A., Key-Based Reversible Data Masking for Business Intelligence Healthcare Analytics Platforms, 2019 International Symposium on Networks, Computers and Communications(ISNCC), pp. 1-6, (2019)
  • [2] Bojchevski A., Gunnemann S., Adversarial Attacks on Node Embeddings via Graph Poisoning, ICML, 97, pp. 695-704, (2019)
  • [3] Borgs C., Chayes J., Cohn H., Et al., An Theory of Sparse Graph Convergence I: Limits, Sparse Random Graph Models, and Power Law Distributions, Transactions of the American Mathematical Society, 372, 5, pp. 3019-3062, (2019)
  • [4] Cai H. Y., Zheng V. W., Chang K. C. C., A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications, IEEE Transactions on Knowledge and Data Engineering, 30, 9, pp. 1616-1637, (2018)
  • [5] Chen J. Y., Lin X., Shi Z. Q., Et al., Link Prediction Adversarial Attack Via Iterative Gradient Attack, IEEE Transactions on Computational Social Systems, 7, 4, pp. 1081-1094, (2020)
  • [6] Cuzzocrea A., Shahriar H., Data Masking Techniques for NoSQL Database Security: A Systematic Review, 2017 IEEE International Conference on Big Data, 2017, pp. 4467-4473, (2017)
  • [7] Dai H.J., Li H., Tian T., Et al., Adversarial Attack on Graph Structured Data, ICML, 80, pp. 1123-1132, (2018)
  • [8] Eikmeier N., Gleich D. F., Revisiting Power - Law Distributions in Spectra of Real-World Networks, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017, pp. 817-826, (2017)
  • [9] Gagula A. C., Santillan J. R., Integrating Geographic Information System, Remote Sensing Data, Field Surveys, and Hydraulic Simulations in Irrigation System Evaluation, Proceedings of the 2020 IEEE REGION 10 CONFERENCE (TENCON), pp. 626-630, (2020)
  • [10] Hui Y.U., Wei Z., Xinnian M.A., A Reversible Decryption Model for Vector and Raster Integration Based on Trigonometric Function, Bulletin of Surveying and Map- ping, 10, pp. 89-94, (2017)